Question1. Give three instances of physiological or behavioural traits which can be employed for biometrics.
Question2. Provide two reasons why biometrics is not as popular as password based systems.
Question3. Suppose two entities A and B want to communicate securely using symmetric encryption. Describe how secure key distribution can be accomplished by using a trusted key distribution centre (KDC).
Question4. What is the major weakness of key distribution using KDC? List 2 ways how this can be overcome.
Question5. Provide two examples of modern block cipher other than DES.
Question6. Digital signature provides non-repudiation. Describe how this is done.
Question7. Give one instance of a MAC algorithm and one instance of a hash function.